Tag: Files
-
Pakistani APT Hackers Attacking Indian Govt Entities With Weaponized Shortcut Files
Cybersecurity experts at Seqrite Labs have reported a surge in cyberattacks against Indian government entities. These attacks have been …
-
CoralRaider Hacker Evade Antivirus Detections Using Malicious LNK File
This campaign is observed to be targeting multiple countries, including the U.S., Nigeria, Germany, Egypt, the U.K., Poland, the …
-
Beware Of Weaponized Zip Files That Deliver WINELOADER Malware
APT29, a Russian threat group, targeted German political parties with a new backdoor called WINELOADER using spear-phishing emails …
-
CrushFTP File Transfer Vulnerability Lets Attackers Download System Files
CrushFTP customers have been warned to patch an actively exploited vulnerability that allows attackers to download system files. In an …
-
The Lifecycle of a Digital File
In the digital world, every document, image, video, or program we create leaves a trail. Understanding the lifecycle of a file, from its …
-
SWF File: What Is It? How Do I Play SWF Files?
In this post, we will show you the SWF file format, how to play it on a Windows PC, and the best software to play SWF files. In the past, …
-
Popular Rust Crate liblzma-sys Compromised with XZ Utils Backdoor Files
“Test files” associated with the XZ Utils backdoor have made their way to a Rust crate known as liblzma-sys, new findings from Phylum …
-
SharePoint Flaws Could Help Threat Actors Evade Detection Easier When Stealing Files
Two methods that researchers have found might allow attackers to get around audit logs or produce less serious entries when they download …
-
Raspberry Robin Distributed Through Windows Script Files
Threat actors distributing Raspberry Robin now use Windows Script Files (WSF) to spread the worm alongside other methods, such as USB …
-
Raspberry Robin observed spreading via Windows Script Files
Cybercriminals have changed a way to spread the Windows worm Raspberry Robin, the HP Threat Research team observed last month. The HP …
-
Beware of Encrypted Phishing Attack With Weaponized SVG Files
Attackers are now leveraging encrypted phishing emails that utilize Scalable Vector Graphics (SVG) files to execute malicious JavaScript …
-
Raspberry Robin Returns: New Malware Campaign Spreading Through WSF Files
Cybersecurity researchers have discovered a new Raspberry Robin campaign wave that propagates the malware through malicious Windows Script …
●●●